Software Security

Executive View

Executive View: Stormpath Identity API - 71013

Information security in general and identity management in particular have become a critical, more and more sophisticated, and costly component for almost every online service. Developers must either invest a lot of effort to implement and maintain it or integrate a third party solution.…

Blog

Azure Active Directory: What is the Graph API?

In Azure Active Directory (AAD) there is a Graph API. This is the main API to access AAD. The idea of a Graph API is not entirely new. The one provided by Facebook is already well established. But what is this really about and why does AAD provide such an API? First of all, I neither like…

Webcast

The Business Side of the API Economy: Enabling the Agile, Connected Enterprise

KuppingerCole Webinar recording

Webinar

Sep 24, 2013: The Business Side of the API Economy: Enabling the Agile, Connected Enterprise

Today’s businesses have to be far more agile than ever before. Competing on global scale, economic turmoil, rapid innovation and other factors put pressure on organizations. One of the results is that businesses have to be better connected with other businesses and customers than ever…

Executive View

Executive View: Intel Expressway API Manager - 70642

With the Expressway API Manager, Intel is attempting to define a new category of platform. It refers to this new platform as a “Composite Platform” designed to expose APIs to business partners and internal or external developers. The Expressway API Manager platform has a…

Webcast

Martin Kuppinger - Big Data done right: Smart Data. Why the API Economy and Life Management Platforms will drive Big Data to the next Level

Session at the European Identity & Cloud Conference 2013 May 16, 2013 11:00

Blog

More Consolidation for the API Economy

CA Technologies acquires Layer 7, MuleSoft acquires Programmable Web, 3Scale gets funding It is clear that the API Economy is kicking into gear in a big way. Last week, Intel announced its acquisition of Mashery, this week, CA Technologies announced its acquisition of Layer7 , MuleSoft…

Blog

Why we need Dynamic Authorization Management

One of the topics I’ve been evangelizing for years is Dynamic Authorization Management. Dynamic Authorization Management is about externalizing authorization decisions outside of applications. It is about using an “application security infrastructure” which performs the authorization…

Blog

How to Make an API

Introduction Making an API is hard. It is also a tough question. A small company out of England has figured out how to let anyone make an API with just: Dropbox A Spreadsheet A Datownia SaaS account Datownia One of the activities I practice to keep up with what is happening in the world…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

The Next Best Thing After "Secure by Design"

There is an old saying that goes like this: “you can lead a horse to water, but you can’t make it drink”. Nothing personal against anyone in particular, but it seems to me that it perfectly represents the current state of cybersecurity across almost any industry. Although the cybersecurity tools are arguably becoming better and more sophisticated, and, for example, cloud service providers are constantly rolling out new security and compliance features in their platforms, the [...]